Connecting the Future: 7 CCS insight predictions for 2018 and beyond

These days we take ubiquitous connectivity so much for granted that it’s easy to forget how far we’ve come in recent years. In March 2003 — less than...

Disaster Recovery: When RPO meets RTO

Disaster recovery as a service or DRaaS sounds dramatic. To allow your business to boom after an unexpected blip, you’ve got to be prepared to...

Managing your People, Processes and Technology – A GDPR Compliance Checklist

As 25th May 2018 looms closer, Information Security personnel and anybody responsible for data protection should be ready to ensure that their...

Intercity Tech5: The tech takeover - Who's really in control?

When the world of tech is so dynamic, there's always a story to spark debate in our office. Are the machines really taking over our tech? Should we...

E3 vs E5: Which Microsoft EMS Security Solution is Right for Your Business?

In the fast-paced, ever-evolving world of business, security should never be an afterthought. As companies embrace the flexibility of modern work,...

Are you secure? The pros and cons of your legacy architecture

When it comes to your existing IT systems, if they’re not broken, don’t fix them, right?

Sometimes I think this is absolutely true; there’s a genuine...

Intercity Tech5: When man meets tech, there's a tale to tell

Being future-forward leaders means we don’t just want to keep on top of the stories that affect our industry, we also want to understand how tech...